Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (316)
  • Article (119)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 44 Next »

64%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
to maintain program correctness. Listing 1 is an example of the ways you can define a coarray. Listing 1: Defining Coarrays integer :: x[*]   ! scalar coarray   real ... Modern Fortran – Part 3
64%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
Gateway Initiative (OSGI) technology. The latest version (version 3.7) is available at the project website [1], where you will also find other introductory materials, including blogs, videos, and sample
64%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks. When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget
64%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
Linux Containers (LXC) [1] and Docker [2], as well as software-defined network (SDN) solutions [3], make extensive use of Linux namespaces, which allow you to define and use multiple virtual
64%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
suite or SAP; enterprise resource planning (ERP) software like Sage X3 and Openbravo; statistical software like SPSS; and dozens of database types. It is possible to integrate cloud storage, like Amazon
64%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
is KeePassX [3]. If you install the tool on a Mac, you can use your database on the go with a MacBook by using synchronization with cloud storage, just as you would for access by iPhone and Android
64%
News for Admins
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
 
by CISA, NSA, and NIST. The Quantum-Readiness: Migration to Post-Quantum Cryptography (PQC) (https://www.cisa.gov/sites/default/files/2023-08/Quantum%20Readiness_Final_CLEAR_508c%20%283%29.pdf) fact sheet ... In the news: US Agencies Issue Quantum-Readiness Recommendations; Bitwarden Secrets Manager; IBM X-Force Releases Detection and Response Framework for Managed File Transfers; National Strategy
63%
Secure remote connectivity with VS Code for the Web
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © fckncg, 123RF.com
step to complete this. 3. Copy the SSH private key data to the local system/env, where the SSH client is also installed. 4. Update the config file containing the SSH session server details. The file
63%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
(ADE-OS). The current version 3.1 is a Red Hat Enterprise Linux version 8.2. Full root access is reserved for the manufacturer's Technical Assist Center. Some services are run as microservices in Docker
63%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
Every ML system (Figure 1) has an input (x ) through which it (one hopes) receives relevant information and from which it typically makes a classification (y ). In the field of cybersecurity, for example

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 44 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice